Refine your search

Your search returned 636 results.

|
161.
Windows Forensic Analysis Toolkit : Advanced Analysis Techniques for Windows 8

by Carvey, Harlan.

Edition: 4th ed.Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 C3726 2014.
162.
Android Hacker's Handbook.

by Drake, Joshua J | Lanier, Zach | Mulliner, Collin | Fora, Pau Oliva | Ridley, Stephen A | Wicherski, Georg.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76 .A65.
163.
Data Mining and Machine Learning in Cybersecurity.

by Dua, Sumeet | Du, Xian.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D343 D825 2011.
164.
The Frugal CISO : Using Innovation and Smart Approaches to Maximize Your Security Posture

by Anderson, Kerry Ann.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.2 .A532 2014.
165.
Conducting Network Penetration and Espionage in a Global Environment.

by Middleton, Bruce.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
166.
Social Engineering Penetration Testing : Executing Social Engineering Pen Tests, Assessments and Defense

by Watson, Gavin | Mason, Andrew | Ackroyd, Richard.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .W38 2014.
167.
Secure Cloud Computing.

by Jajodia, Sushil | Kant, Krishna | Samarati, Pierangela | Singhal, Anoop | Swarup, Vipin | Wang, Cliff.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.88813.
168.
Autonomic Computing Enabled Cooperative Networked Design.

by Wodczak, Michal.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
169.
Agile Risk Management.

by Moran, Alan.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.751.
170.
Python Forensics : A workbench for inventing and sharing digital forensic technology

by Hosmer, Chet.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.73 .P98.
171.
Ethical Hacking and Penetration Testing Guide.

by Baloch, Rafay.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
172.
Cloud Management and Security.

by Abbadi, Imad M.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .A23 2014.
173.
Electronic Identity.

by de Andrade, Norberto Nuno Gomes | Chen-Wilson, Lisha | Argles, David | Wills, Gary | Zenise, Michele Schiano di.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: K845.F6 .D76 2014.
174.
Case Studies in Secure Computing : Achievements and Trends

by Issac, Biju | Israr, Nauman.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
175.
Selected papers from Kaspersky Lab''s CyberSecurity for the Next Generation Conference 2013.

by Furnell, Steven | Ginodman, Veniamin | Obelets, Natalya | Herkanaidu, Ram.

Material type: Text Text; Format: electronic available online remote Publisher: Bradford : Emerald Group Publishing Limited, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
176.
Smart Security : Proven Practices

by Quilter, J. David.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8290.
177.
Measuring and Managing Information Risk : A FAIR Approach

by Freund, Jack | Jones, Jack.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD38.7 .M36.
178.
Hacking and Penetration Testing with Low Power Devices.

by Polstra, Philip.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25 P5965 2015.
179.
Trustworthy Reconfigurable Systems : Enhancing the Security Capabilities of Reconfigurable Hardware Architectures

by Feller, Thomas.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
180.
Cyber-Development, Cyber-Democracy and Cyber-Defense : Challenges, Opportunities and Implications for Theory, Policy and Practice

by Carayannis, Elias G | Campbell, David F. J | Efthymiopoulos, Marios Panagiotis.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.